CVE-2025-6171
BaseFortify
Publication date: 2025-11-15
Last updated on: 2025-11-20
Assigner: GitLab Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitlab | gitlab | From 13.2.0 (inc) to 18.3.6 (exc) |
| gitlab | gitlab | From 13.2.0 (inc) to 18.3.6 (exc) |
| gitlab | gitlab | From 18.4.0 (inc) to 18.4.4 (exc) |
| gitlab | gitlab | From 18.4.0 (inc) to 18.4.4 (exc) |
| gitlab | gitlab | From 18.5.0 (inc) to 18.5.2 (exc) |
| gitlab | gitlab | From 18.5.0 (inc) to 18.5.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in GitLab CE/EE allowed an authenticated attacker with reporter access to view branch names and pipeline details by accessing the packages API endpoint, even when repository access was disabled. It affected all versions from 13.2 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2.
How can this vulnerability impact me? :
The vulnerability could allow an attacker with reporter access to gain unauthorized visibility into branch names and pipeline details, potentially exposing sensitive project structure information, which could be used for further attacks or information gathering.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade GitLab CE/EE to versions 18.3.6 or later, 18.4.4 or later, or 18.5.2 or later, as these versions contain the fix that prevents authenticated users with reporter access from viewing branch names and pipeline details via the packages API endpoint when repository access is disabled.